Review basic security concepts and controls that can be used by administrators to secure physical devices and media and fulfill the CompTIA-specified objectives for the Communications Security section of the Security+ exam.

This chapter is from the book

This chapter is from the book

Objectives

This chapter covers the following CompTIA-specified objectives for the
Communications Security section of the Security+ exam.

Understand the basic security concepts of network devices.

It is important for you to understand the basic security concepts of
network devices, such as firewalls, routers, switches, and so on, so you can
protect the environment and outgoing and incoming communications on these
devices.

Understand the basic security concepts of storage media devices.

It is important for you to understand the basic security concepts of
storage media devices (such as the various types of cable and removable media)
so you can protect the environment and outgoing and incoming communications on
these devices.

Understand the basic security concepts of security topologies.

It is important for you to understand the basic concepts of security
topologies (such as security zones, VLANs, NAT, and tunneling) so you can
protect the environment and outgoing and incoming communications.

Outline

Introduction

Understanding the Basic Security Concepts of Network and System Devices

Firewalls

Packet-Filtering Firewall

Circuit-Level Gateway

Application-Level Gateway

Stateful Inspection Firewall

Other Firewall Considerations

Routers

Switches

Wireless and Mobile Communications

Modems

RAS

Telecommunications/PBX

IDS

Network Monitoring/Diagnostic

Fault Management

Configuration Management

Accounting Management

Performance Management

Security Management

Simple Network Management Protocol

RMON

Workstations

Servers

Understanding the Basic Security Concepts of Media

Coaxial Cable

UTP/STP

Fiber

Infrared, RF, and Microwave

Removable Media

Tape

CDR

Hard Drives and Disks

Flashcards and Nonvolatile Memory

Smart Cards

Understanding the Concepts of Security Topologies

Security Zones

Bastion Host

Screened Host Gateway

Screened Subnet Gateway

DMZs

Intranets

Extranets

Virtual Local Area Networks

Network Address Translation

Tunneling

Chapter Summary

Apply Your Knowledge

Study Strategies

One of the most important topics of this chapter is security topology and
firewalls, which are security controls designed specifically to protect the
infrastructure. Be sure you understand the types of firewalls and security
topology configurations.

If you have access to a Cisco router, Unix machine, or Windows 2000
machine (better yet, all three), make sure you are familiar with features such
as access lists and IP filtering.

Set up one or more of the security topologies in your lab.

Introduction

This chapter takes you through the basics of media, devices, and security
topology. Protecting communications includes more than securing the software
technologies and protocols covered in Chapter 2, "Communication
Security." The infrastructure, including all network devices, servers, and
data, also requires security controls on all levels to ensure company-wide
network security.